Software encryption and decryption method and system based on virtual environment

A virtual environment, encryption and decryption technology, applied in software deployment, software engineering design, program code conversion, etc., can solve the problems of high implementation cost, lack of flexibility in configuration, and high comprehensive cost

Pending Publication Date: 2021-04-23
SHANXI UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The comprehensive cost is relatively high, and the configuration is also inflexible. It cannot meet the principle of irrelevance of encryption and decryption protocol algorithms and cannot realize virtual cloud processing.
The Intel® QuickAssist Technology protocol processing solution can realize the encryption and decryption processing of the server, and can also pass through the device to the virtual device, but the corresponding cost is relatively high, and the technical design of the software and hardware is also relatively complicated
[0005] To sum up, the existing technology has the following disadvantages: (1) High-performance data encryption and decryption processing requires the cooperation of dedicated hardware equipment, high implementation costs, and inflexible configuration
(2) The scalability of dedicated hardware is poor, and the implementation cycle is long
(3) The processing efficiency of the kernel software is low, and the processing of large-scale encryption and decryption data is not timely, and the delay is relatively large
[0006] That is to say, the current operating system cannot meet the encryption and decryption requirements of large-flow data; the dedicated encryption and decryption hardware cannot meet the virtualization requirements; the cost of coprocessor hardware equipment is high and the technology is complex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software encryption and decryption method and system based on virtual environment
  • Software encryption and decryption method and system based on virtual environment
  • Software encryption and decryption method and system based on virtual environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are part of the embodiments of the present invention, rather than All the embodiments; based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts all belong to the protection scope of the present invention.

[0039] The embodiment of the present invention provides a software encryption and decryption method and system based on a virtual environment, which uses DPDK technology under a virtual network device to complete IPSec data processing in a user state. The software encryption and decryption method of the present invention mainly includes the separation of signaling and service data processing in IPSec, the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of communication, in particular to a software encryption and decryption method and system based on a virtual environment, and the method comprises the following steps: S1, completing the preliminary classification and recombination of data on all external interfaces in a user mode through DPDK according to the protocol type of an IP message, and separating the signaling data from the service data according to an analysis result; s2, sending the signaling data to a user state through an inner core so as to complete signaling interaction of IPSec and SA negotiation and link establishment of IPSec; s3, in a user mode, extracting Sa/Sp/Route information of a link through a Netlink interface and a PF_KEY interface mirror image, and performing link information configuration; and S4, finally, performing encryption and decryption processing and routing forwarding on the service data according to the data flow direction in the user mode. According to the invention, the system processing capability of IPSec is greatly improved, high-performance IPSec data processing is realized, and the cloud virtualization trend of IPSec processing is satisfied.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a software encryption and decryption method and system based on a virtual environment. Background technique [0002] "Internet Protocol Security (IPSec)" is an end-to-end mechanism designed by IETF to ensure the security of IP layer communication, and it is an open framework structure. The IPSec protocol is not a separate protocol. It provides a complete set of architecture for network data security on the IP layer, including the network authentication protocol AH (Authentication Header, authentication header), ESP (Encapsulating Security Payload, encapsulating security load), IKE (Internet Key Exchange, Internet Key Exchange) and some algorithms for network authentication and encryption, etc. Among them, the AH protocol and the ESP protocol are used to provide security services, and the IKE protocol is used for key exchange. The IKE protocol is an application layer prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F8/41G06F8/60
CPCG06F8/427G06F8/60G06F21/602
Inventor 张峰
Owner SHANXI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products